The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With companies such as Netflix and YouTube accounting for more than 50% of the peak download traffic on North American fixed networks in 2015, video streaming represents a significant source of Internet traffic. Multimedia delivery over the Internet has evolved rapidly over the past few years. The last decade has seen video streaming transitioning from User Datagram Protocol to Transmission Control...
After several years of research towards sophisticated QoS measurement tools and methods, the results given to endusers by most commonly used on-line speed measurement tools are still far from being precise. In order to define a reliable Internet speed measurement methodology for endusers, the impact that the static and dynamic constraints of network nodes and TCP/IP implementations could impose must...
Internet connectivity in most rural African areas has been viewed as a major challenge due to lack of reliable power, scarcity of network expertise and expensive installation of network equipment. With the rapid development of wireless technologies, Wireless Mesh Network (WMN) has emerged as a promising networking infrastructure, bridging the digital divide between the urban and rural areas. However,...
The paper concerns credibility of construction methods for affect-annotated lexicons, specifically a web questionnaire is explored and evaluated. Web-based surveys are susceptible to some risks, which might influence credibility of the results, as some participants might perform random clicks or intentionally falsify the responses. The paper explores the risks and proposes some strategies to reduce...
Mapping an IP address to the Autonomous System announcing it is a key feature in network monitoring, and - as a consequence - in network management and research. An informed choice of the tool to use and of the database to query, is of extreme importance for the consistence of the obtained results. In this paper, we evaluate the reliability of the whois tool and the consistence of its results while...
Confronted to the increasing dynamic of Internet routing system and its underlying topology, we propose a reliability and availability analysis method based on the characterization of the dynamic properties (in particular, the stability properties) of routing paths and their corresponding forwarding paths. The key driver underlying this method is that transient but frequent changes in the spatio-temporal...
According to Construal Level Theory (CLT), an event such as the online purchase of a product is psychologically distant when online consumers are unable to touch and verify real products prior to purchase. Therefore, this article provides an empirical study on the psychological distance (temporal distance, social distance, spatial distance) among the major B2C online retailers in China by comparing...
Content replication and placement is an area that has been well explored in the scope of Content Delivery Networks (CDNs), but has received relatively less attention from the research community when it comes to Wireless Mesh Networks (WMNs). There are a number of Replica Placement Algorithms (RPAs) that are specifically designed for CDNs. But they do not consider the special features of wireless networks...
Recently, the number of remote systems using the Internet has been increased and the services provided by such systems get various. They are required to have high dependability. The existing evaluations have some problems. For example, the evaluations based on RASIS are vague and those provided by Japanese government are very complicated. The existing evaluations are not uniformed, not understandable,...
Supervisory Control and Data Acquisition (SCADA) systems control and monitor industrial and critical infrastructure functions, such as electricity, gas, water, waste, railway and traffic. Recently, SCADA systems have been targeted by an increasing number of attacks from the Internet due to its grow- ing connectivity to Enterprise networks. Traditional techniques and models of identifying attacks,...
Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based interaction models. Due to the dynamics in such systems, networks are in a state of constant flux and change. Several fundamental concepts, including discovery, interactions, task delegations and executions are no longer based on static...
Doctrinally, Priority Intelligence Requirements (PIRs) represent information that the commander needs to know in order to make a decision or achieve a desired effect. Networked warfare provides the intelligence officer with access to multitudes of sensor outputs and reports, often from unfamiliar sources. Counterinsurgency requires evaluating information across all PMESII-PT categories: Political,...
Service quality has been a construct of interest in strategic management and marketing research for many years. Nevertheless, the phenomenon of e-commerce service has only been recently introduced. The purpose of this paper is to develop an instrument for measuring service quality in an e-commerce context. In the current study, e-commerce service quality (ESQ) was conceptualized as a multi-dimensional...
Failure phenomena of Web server systems are considered to depend on their workload characteristics. In this paper we focus on an Apache server system and analyze the real access/error logs. Based on parametric and non-parametric statistics, we characterize the web server failure from both theoretical and empirical points of view. As the result, it can be shown that the number of sessions strongly...
Although the topic of e-business (EB) measurement belongs to one of research priorities in EB, we are short of a measurement framework for EB benchmarking in firms, especially lacking studies on important indicators explained by the actual state of EB in enterprises. Based on an indicator system, an empirical study is made to optimize the indicator system. First, a theoretical framework is presented,...
Question Answering Systems (QAS) are receiving increasing attention from information systems researchers, particularly those in the information retrieval and natural language processing communities. Evaluation of an information system’s success and user satisfaction are important issues in information systems research, especially for emerging online service systems on the Internet. Although many QAS...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.